• Title/Summary/Keyword: 영상 암호

Search Result 100, Processing Time 0.026 seconds

Fault Tolerant Encryption and Data Compression under Ubiquitous Environment (Ubiquitous 환경 하에서 고장 극복 암호 및 데이터 압축)

  • You, Young-Gap;Kim, Han-Byeo-Ri;Park, Kyung-Chang;Lee, Sang-Jin;Kim, Seung-Youl;Hong, Yoon-Ki
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.91-98
    • /
    • 2009
  • This paper presents a solution to error avalanche of deciphering where radio noise brings random bit errors in encrypted image data under ubiquitous environment. The image capturing module is to be made comprising data compression and encryption features to reduce data traffic volume and to protect privacy. Block cipher algorithms may experience error avalanche: multiple pixel defects due to single bit error in an encrypted message. The new fault tolerant scheme addresses error avalanche effect exploiting a three-dimensional data shuffling process, which disperses error bits on many frames resulting in sparsely isolated errors. Averaging or majority voting with neighboring pixels can tolerate prominent pixel defects without increase in data volume due to error correction. This scheme has 33% lower data traffic load with respect to the conventional Hamming code based approach.

A Study on Image Integrity Verification Based on RSA and Hash Function (RSA와 해시 함수 기반 이미지 무결성 검증에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.878-883
    • /
    • 2020
  • Cryptographic algorithms are used to prevent the illegal manipulation of data. They are divided into public-key cryptosystems and symmetric-key cryptosystems. Public-key cryptosystems require considerable time for encryption and decryption compared to symmetric-key cryptosystem. On the other hand, key management, and delivery are easier for public-key cryptosystems than symmetric-key cryptosystems because different keys are used for encryption and decryption. Furthermore, hash functions are being used very effectively to verify the integrity of the digital content, as they always generate output with a fixed size using the data of various sizes as input. This paper proposes a method using RSA public-key cryptography and a hash function to determine if a digital image is deformed or not and to detect the manipulated location. In the proposed method, the entire image is divided into several blocks, 64×64 in size. The watermark is then allocated to each block to verify the deformation of the data. When deformation occurs, the manipulated pixel will be divided into smaller 4×4 sub-blocks, and each block will have a watermark to detect the location. The safety of the proposed method depends on the security of the cryptographic algorithm and the hash function.

FPGA-Based Post-Quantum Cryptography Hardware Accelerator Design using High Level Synthesis (HLS 를 이용한 FPGA 기반 양자내성암호 하드웨어 가속기 설계)

  • Haesung Jung;Hanyoung Lee;Hanho Lee
    • Transactions on Semiconductor Engineering
    • /
    • v.1 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • This paper presents the design and implementation of Crystals-Kyber, a next-generation postquantum cryptography, as a hardware accelerator on an FPGA using High-Level Synthesis (HLS). We optimized the Crystals-Kyber algorithm using various directives provided by Vitis HLS, configured the AXI interface, and designed a hardware accelerator that can be implemented on an FPGA. Then, we used Vivado tool to design the IP block and implement it on the ZYNQ ZCU106 FPGA. Finally, the video was recorded and H.264 compressed with Python code in the PYNQ framework, and the video encryption and decryption were accelerated using Crystals-Kyber hardware accelerator implemented on the FPGA.

Watermarking-based cryptographic synchronization signal transmission and detection (워터마킹 기반의 암호동기신호 전송 및 검출)

  • Son, Young-ho;Bae, Keun-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1589-1596
    • /
    • 2017
  • In synchronous secure communications, a synchronization signal is transmitted over the same channel where ciphertext is transmitted for cryptographic synchronization between an encryptor and a decryptor, so, it causes data rate lowering and transmission delay for plain communication. Especially, in poor environments such as wireless channels and so on, since secure communications require a periodic resynchronization protocol, synchronization signal transmission method can dominate its quality. In this paper, we proposed a new synchronization signal transmission method without additional bandwidth as well as resynchronization protocol based on it. We embeded a synchronization signal as a watermark in a transmission image and restored it from a detected watermark in the decryptor. Experimental results of image have demonstrated that the proposed synchronization signal transmission method using watermarking is efficient in transmission rate and can support reliable synchronization detection.

DCI Based Watermarking for Image Verification and Authentication (인증과 무결성을 위한 DCT 기반 워터마킹)

  • 이혜란;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.506-509
    • /
    • 2001
  • 본 논문에서는 디지털 영상의 변조를 확인함과 동시에 변조의 위치를 확인하는 DCT 기반의 fragile watermarking을 제안한다. 디지털 영상의 인증과 무결성을 위해 기존의 Wong이 사용한 해쉬 함수와 비대칭키 암호 알고리즘을 사용하며, 영상에 DCT 변환을 함으로서 영상의 모든 픽셀에 워터마크를 삽입하지 않고서도 변조의 유무를 확인하는 것이 가능하다. 본 논문에서는 DCT 계수 중 일부 저주파 계수의 하위 비트에 워터마크를 삽입하여 워터마크의 비가시성과 연성을 만족하며 변조의 유무와 위치를 확인한 수 있게 된다.

  • PDF

A Key Creation System for Digital Signature and Authentication using Fingerprint Feature (지문영상을 이용한 전자서명 키의 실시간 생성 및 인증 시스템 설계 및 구현)

  • 김재호;한현구
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.671-673
    • /
    • 2000
  • 현실세계에서 사이버 세계로의 전환은 우리에게 많은 생활의 변화를 가져옴과 동시에 혼란을 동반 하고 있다. 이러한 상황에서 암호기술은 사이버 세계의 질서를 잡는 핵심기술로 발전하고 있다. 본 논문에서는 기존의 공개키 기반 구조의 단점들을 보안 하는 방법으로 생체인증 기술인 지문 인식시스템과 RSA암호 알고리즘을 결합한 새로운 인증 시스템을 제안한다.

  • PDF

Identification and Decryption of Fully phase-encrypted image Using Joint Transform Correlator Structure (결합변환상관기 구조를 이용한 위상 암호화 영상의 인식 및 복호화)

  • 신창목;김수중
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2004.06a
    • /
    • pp.95-98
    • /
    • 2004
  • 본 논문에서는 결합변환상관기(joint transform correlator)와 위상 암호화된 영상들을 이용하여 영상의 인식 및 복호화가 가능한 광 암호화 시스템을 제안하였다. 그레이 값을 가지는 원 영상은 동일한 그레이 값을 가지는 이진 영상으로 나누어 표현할 있다. 이러한 이진 영상들을 각각의 다른 이진 무작위 영상과 위상 부호화한 XOR 연산을 이용해 암호화할 수 있으며. 암호화한 영상들을 결합한 후 위상 부호화 과정을 거쳐 최종 암호화 영상를 구한다. 키 영상은 암호화에 사용된 각각의 이진 무작위 영상들을 최종 암호와 영상를 얻을때의 과정처럼 결합하여 역시 하나의 영상으로 구할 수 있다. 최종 암호화 영상과 키 영상을 제안한 결합변환상관기의 입력으로 사용하여 구한 상관치는 높고 폭이 좁은 특성을 가지고 있으므로 분별성능이 좋은 인식 시스템을 구현할 수 있을 뿐만 아니라 복호화 영상도 구할 수 있다. 컴퓨터 모의 실험으로 제안한 방법을 확인해보았다.

  • PDF

A Study on the Prevention of Smartcard Forgery and Alteration Using Angular Multiplexing and Private Key Multiplexing based on Optical Encryption (영상 암호화 기반에서의 각다중화 및 암호키 다중화 기법을 이용한 스마트카드 위 .변조 방지에 관한 연구)

  • 장홍종;이성은;이정현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.63-69
    • /
    • 2001
  • Smartcard is highlighted as infrastructure that has an excellent security for executing functions such as user authentication, access control, information storage and control, and its market is expanding rapidly. But possibilities of forgery and alteration by hacking are increasing as well. This paper proposes a method to prevent card forgery and alteration using angular multiplexing and private key multiplexing method on optical encryption, and proposed a Public Key Infrastructure(PKI)-based authentication system combined with One-Time Password (OTP) for verification of forgery and alteration .

Design of Digital Media Protection System using Elliptic Curve Encryption (타원 곡선 암호화를 이용한 영상 저작권 보호 시스템 설계)

  • Lee, Chan-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.1
    • /
    • pp.39-44
    • /
    • 2009
  • The advance of communication and networking technology enables high bandwidth multimedia data transmission. The development of high performance compression technology such as H.264 also encourages high quality video and audio data transmission. The trend requires efficient protection system for digital media rights. We propose an efficient digital media protection system using elliptic curve cryptography. Only key parameters are encrypted to reduce the burden of complex encryption and decryption in the proposed system, and the digital media are not played back or the quality is degraded if the encrypted information is missing. We need a playback system with an ECC processor to implement the proposed system. We implement an H.264 decoding system with a configurable ECC processor to verify the proposed protection system We verify that the H.264 movie is not decoded without the decrypted information.

세상을 바꿀 10대 뉴 테크놀로지

  • Korean Federation of Science and Technology Societies
    • The Science & Technology
    • /
    • no.3 s.406
    • /
    • pp.54-61
    • /
    • 2003
  • 주입식 조직공학/ 무선센서망/ 글리코믹스/ 그리드 컴퓨팅/ 메카트로닉스/ 나노인쇄 리토그래피/ 분자 영상/ 양자 암호/ 나노태양전지/ 소프트웨어의 보증

  • PDF